This bug was fixed in the package linux-lowlatency-hwe-5.15 - 5.15.0-58.64~20.04.1
--------------- linux-lowlatency-hwe-5.15 (5.15.0-58.64~20.04.1) focal; urgency=medium
* focal/linux-lowlatency-hwe-5.15: 5.15.0-58.64~20.04.1 -proposed tracker (LP: #2001659)
[ Ubuntu: 5.15.0-58.64 ]
* jammy/linux-lowlatency: 5.15.0-58.64 -proposed tracker (LP: #2001660) * jammy/linux: 5.15.0-58.64 -proposed tracker (LP: #2001670) * CVE-2022-3643 - xen/netback: Ensure protocol headers don't fall in the non-linear area * CVE-2022-4378 - proc: proc_skip_spaces() shouldn't think it is working on C strings - proc: avoid integer type confusion in get_proc_long * CVE-2022-45934 - Bluetooth: L2CAP: Fix u8 overflow * CVE-2022-42896 - Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM - Bluetooth: L2CAP: Fix l2cap_global_chan_by_psm
-- Thadeu Lima de Souza Cascardo <email address hidden> Fri, 06 Jan 2023 15:04:51 -0300
This bug was fixed in the package linux-lowlatenc y-hwe-5. 15 - 5.15.0- 58.64~20. 04.1
--------------- y-hwe-5. 15 (5.15.0- 58.64~20. 04.1) focal; urgency=medium
linux-lowlatenc
* focal/linux- lowlatency- hwe-5.15: 5.15.0- 58.64~20. 04.1 -proposed tracker
(LP: #2001659)
[ Ubuntu: 5.15.0-58.64 ]
* jammy/linux- lowlatency: 5.15.0-58.64 -proposed tracker (LP: #2001660) chan_by_ psm
* jammy/linux: 5.15.0-58.64 -proposed tracker (LP: #2001670)
* CVE-2022-3643
- xen/netback: Ensure protocol headers don't fall in the non-linear area
* CVE-2022-4378
- proc: proc_skip_spaces() shouldn't think it is working on C strings
- proc: avoid integer type confusion in get_proc_long
* CVE-2022-45934
- Bluetooth: L2CAP: Fix u8 overflow
* CVE-2022-42896
- Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM
- Bluetooth: L2CAP: Fix l2cap_global_
-- Thadeu Lima de Souza Cascardo <email address hidden> Fri, 06 Jan 2023 15:04:51 -0300